URL:

https://browser.yandex.com/

Full analysis: https://app.any.run/tasks/b39d611b-c958-484e-bf63-ec249279507c
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 09, 2023, 01:15:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
Indicators:
MD5:

D121EBB4C6C5BA79CCE75CFE2CF3F102

SHA1:

97507A88E661E9B3B224F68C709F2C8B119C9C1D

SHA256:

8A932E72B2215EBF589E51D0A2B079990503720F2598FF533B91CC873B0D8BFB

SSDEEP:

3:N8Ucoiy:20z

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • yb32C7.tmp (PID: 2096)
      • setup.exe (PID: 3912)
      • service_update.exe (PID: 2960)
      • browser.exe (PID: 2504)
    • Actions looks like stealing of personal data

      • service_update.exe (PID: 2948)
      • setup.exe (PID: 2612)
      • service_update.exe (PID: 2960)
      • service_update.exe (PID: 2688)
      • setup.exe (PID: 3912)
      • service_update.exe (PID: 1232)
      • clidmgr.exe (PID: 3536)
      • browser.exe (PID: 3996)
      • browser.exe (PID: 3576)
      • service_update.exe (PID: 3120)
      • service_update.exe (PID: 2692)
      • clidmgr.exe (PID: 3228)
      • browser.exe (PID: 2984)
      • browser.exe (PID: 2492)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2668)
      • browser.exe (PID: 3900)
      • browser.exe (PID: 4080)
      • browser.exe (PID: 3204)
      • browser.exe (PID: 1696)
      • browser.exe (PID: 2292)
      • browser.exe (PID: 3924)
      • browser.exe (PID: 1820)
      • browser.exe (PID: 3004)
      • browser.exe (PID: 3760)
      • browser.exe (PID: 2724)
      • browser.exe (PID: 2336)
      • browser.exe (PID: 1508)
      • browser.exe (PID: 304)
      • browser.exe (PID: 3544)
      • browser.exe (PID: 2648)
      • browser.exe (PID: 2252)
      • browser.exe (PID: 3752)
      • browser.exe (PID: 3092)
      • browser.exe (PID: 3768)
      • browser.exe (PID: 2456)
      • browser.exe (PID: 2584)
      • browser.exe (PID: 3072)
      • browser.exe (PID: 2156)
      • browser.exe (PID: 732)
      • browser.exe (PID: 3200)
      • browser.exe (PID: 2884)
      • browser.exe (PID: 2296)
      • browser.exe (PID: 3960)
      • browser.exe (PID: 3040)
      • browser.exe (PID: 2836)
      • browser.exe (PID: 3792)
      • browser.exe (PID: 1936)
      • browser.exe (PID: 3856)
      • browser.exe (PID: 1760)
      • browser.exe (PID: 2380)
      • browser.exe (PID: 3112)
      • browser.exe (PID: 2436)
      • browser.exe (PID: 1560)
      • browser.exe (PID: 2404)
      • browser.exe (PID: 2976)
      • browser.exe (PID: 1116)
      • browser.exe (PID: 1636)
      • browser.exe (PID: 2504)
      • browser.exe (PID: 2820)
      • browser.exe (PID: 3460)
      • browser.exe (PID: 1696)
      • browser.exe (PID: 3336)
      • browser.exe (PID: 3256)
      • browser.exe (PID: 3424)
      • browser.exe (PID: 3956)
      • browser.exe (PID: 2268)
      • browser.exe (PID: 2076)
      • browser.exe (PID: 3244)
      • browser.exe (PID: 2620)
      • browser.exe (PID: 2456)
      • browser.exe (PID: 2944)
      • browser.exe (PID: 2316)
    • Creates a writable file in the system directory

      • service_update.exe (PID: 3120)
    • Steals credentials from Web Browsers

      • browser.exe (PID: 3160)
    • Steals credentials

      • browser.exe (PID: 2292)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3848)
      • service_update.exe (PID: 2960)
      • setup.exe (PID: 3912)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2336)
    • Checks Windows Trust Settings

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
    • Reads security settings of Internet Explorer

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
    • Reads settings of System Certificates

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2336)
    • Application launched itself

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3848)
      • setup.exe (PID: 3912)
      • service_update.exe (PID: 3120)
      • service_update.exe (PID: 2688)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2292)
      • browser.exe (PID: 2336)
    • Starts application with an unusual extension

      • Yandex.exe (PID: 2384)
    • Adds/modifies Windows certificates

      • setup.exe (PID: 3912)
    • Starts itself from another location

      • service_update.exe (PID: 2960)
    • Searches for installed software

      • setup.exe (PID: 3912)
    • Executes as Windows Service

      • service_update.exe (PID: 3120)
    • Reads Mozilla Firefox installation path

      • browser.exe (PID: 3160)
  • INFO

    • Checks supported languages

      • wmpnscfg.exe (PID: 3360)
      • Yandex.exe (PID: 3740)
      • Yandex.exe (PID: 2384)
      • yb32C7.tmp (PID: 2096)
      • setup.exe (PID: 3848)
      • setup.exe (PID: 3912)
      • setup.exe (PID: 2612)
      • service_update.exe (PID: 2960)
      • service_update.exe (PID: 2688)
      • service_update.exe (PID: 2948)
      • service_update.exe (PID: 3120)
      • clidmgr.exe (PID: 3536)
      • browser.exe (PID: 3160)
      • service_update.exe (PID: 1232)
      • clidmgr.exe (PID: 3228)
      • browser.exe (PID: 3576)
      • browser.exe (PID: 2492)
      • browser.exe (PID: 3996)
      • service_update.exe (PID: 2692)
      • browser.exe (PID: 2984)
      • browser.exe (PID: 2668)
      • browser.exe (PID: 3900)
      • browser.exe (PID: 3204)
      • browser.exe (PID: 4080)
      • browser.exe (PID: 1696)
      • browser.exe (PID: 2292)
      • browser.exe (PID: 2336)
      • browser.exe (PID: 3924)
      • browser.exe (PID: 1820)
      • browser.exe (PID: 1508)
      • browser.exe (PID: 3760)
      • browser.exe (PID: 3004)
      • browser.exe (PID: 2724)
      • browser.exe (PID: 3768)
      • browser.exe (PID: 3544)
      • browser.exe (PID: 2648)
      • browser.exe (PID: 3092)
      • browser.exe (PID: 2252)
      • browser.exe (PID: 3752)
      • browser.exe (PID: 2584)
      • browser.exe (PID: 2456)
      • browser.exe (PID: 304)
      • browser.exe (PID: 732)
      • browser.exe (PID: 2156)
      • browser.exe (PID: 3200)
      • browser.exe (PID: 3792)
      • browser.exe (PID: 3072)
      • browser.exe (PID: 2884)
      • browser.exe (PID: 3040)
      • browser.exe (PID: 2296)
      • browser.exe (PID: 2836)
      • browser.exe (PID: 1936)
      • browser.exe (PID: 2380)
      • browser.exe (PID: 3856)
      • browser.exe (PID: 2436)
      • browser.exe (PID: 1560)
      • browser.exe (PID: 2404)
      • browser.exe (PID: 2976)
      • browser.exe (PID: 3112)
      • browser.exe (PID: 3960)
      • browser.exe (PID: 1760)
      • browser.exe (PID: 2820)
      • browser.exe (PID: 1116)
      • browser.exe (PID: 1636)
      • browser.exe (PID: 1696)
      • browser.exe (PID: 3256)
      • browser.exe (PID: 3336)
      • browser.exe (PID: 3460)
      • browser.exe (PID: 3424)
      • browser.exe (PID: 2504)
      • browser.exe (PID: 2456)
      • browser.exe (PID: 2944)
      • browser.exe (PID: 2076)
      • browser.exe (PID: 2268)
      • browser.exe (PID: 2620)
      • browser.exe (PID: 3956)
      • browser.exe (PID: 3244)
      • browser.exe (PID: 2316)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3360)
      • browser.exe (PID: 3160)
    • Drops the executable file immediately after the start

      • chrome.exe (PID: 3048)
    • The process uses the downloaded file

      • chrome.exe (PID: 3048)
      • Yandex.exe (PID: 3740)
      • chrome.exe (PID: 3224)
    • Reads the computer name

      • Yandex.exe (PID: 3740)
      • wmpnscfg.exe (PID: 3360)
      • yb32C7.tmp (PID: 2096)
      • setup.exe (PID: 3848)
      • setup.exe (PID: 3912)
      • service_update.exe (PID: 2960)
      • service_update.exe (PID: 2948)
      • service_update.exe (PID: 2688)
      • service_update.exe (PID: 3120)
      • clidmgr.exe (PID: 3536)
      • clidmgr.exe (PID: 3228)
      • browser.exe (PID: 3160)
      • service_update.exe (PID: 1232)
      • browser.exe (PID: 2984)
      • browser.exe (PID: 2492)
      • browser.exe (PID: 3900)
      • browser.exe (PID: 2292)
      • browser.exe (PID: 2336)
      • browser.exe (PID: 3760)
      • browser.exe (PID: 1508)
      • browser.exe (PID: 1820)
      • browser.exe (PID: 3956)
      • browser.exe (PID: 2620)
      • browser.exe (PID: 2944)
    • Create files in a temporary directory

      • Yandex.exe (PID: 3740)
      • yb32C7.tmp (PID: 2096)
      • setup.exe (PID: 3848)
      • setup.exe (PID: 3912)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2336)
      • browser.exe (PID: 2292)
    • Creates files or folders in the user directory

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
      • setup.exe (PID: 2612)
      • clidmgr.exe (PID: 3228)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2984)
      • browser.exe (PID: 2336)
      • browser.exe (PID: 3924)
      • browser.exe (PID: 2268)
      • browser.exe (PID: 2456)
    • Reads the machine GUID from the registry

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2336)
    • Checks proxy server information

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
    • Application launched itself

      • chrome.exe (PID: 3048)
    • Creates files in the program directory

      • service_update.exe (PID: 2960)
      • service_update.exe (PID: 3120)
    • Process checks computer location settings

      • browser.exe (PID: 3160)
      • browser.exe (PID: 3204)
      • browser.exe (PID: 1696)
      • browser.exe (PID: 3004)
      • browser.exe (PID: 2724)
      • browser.exe (PID: 3768)
      • browser.exe (PID: 304)
      • browser.exe (PID: 2252)
      • browser.exe (PID: 2648)
      • browser.exe (PID: 3424)
      • browser.exe (PID: 2316)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
93
Malicious processes
79
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs wmpnscfg.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs yandex.exe yandex.exe yb32c7.tmp no specs setup.exe no specs setup.exe setup.exe service_update.exe service_update.exe service_update.exe service_update.exe service_update.exe service_update.exe clidmgr.exe clidmgr.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6a7a8b38,0x6a7a8b48,0x6a7a8b54C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
304"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --help-url=https://api.browser.yandex.com/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --ya-custo-process --enable-instaserp --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4112 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 /prefetch:1C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
732"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --process-name="Data Decoder Service" --mojo-platform-channel-handle=5728 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 --brver=23.11.1.730 /prefetch:8C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1116"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --process-name="Data Decoder Service" --mojo-platform-channel-handle=6360 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 --brver=23.11.1.730 /prefetch:8C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1232"C:\Program Files\Yandex\YandexBrowser\23.11.1.730\service_update.exe" --update-background-schedulerC:\Program Files\Yandex\YandexBrowser\23.11.1.730\service_update.exe
service_update.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
MEDIUM
Description:
Yandex
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\program files\yandex\yandexbrowser\23.11.1.730\service_update.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1508"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1736 --field-trial-handle=1740,i,6827865572396833927,6806636244492292914,262144 /prefetch:2C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1560"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --process-name="Data Decoder Service" --mojo-platform-channel-handle=5584 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 --brver=23.11.1.730 /prefetch:8C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1636"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --process-name="Data Decoder Service" --mojo-platform-channel-handle=5008 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 --brver=23.11.1.730 /prefetch:8C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1696"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --help-url=https://api.browser.yandex.com/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --allow-prefetch --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3424 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 /prefetch:1C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1696"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --process-name="Data Decoder Service" --mojo-platform-channel-handle=6040 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 --brver=23.11.1.730 /prefetch:8C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
Total events
38 499
Read events
38 217
Write events
260
Delete events
22

Modification events

(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
1
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3048) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_installdate
Value:
0
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_enableddate
Value:
0
Executable files
24
Suspicious files
540
Text files
194
Unknown types
15

Dropped files

PID
Process
Filename
Type
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF2100bb.TMP
MD5:
SHA256:
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Variationsbinary
MD5:961E3604F228B0D10541EBF921500C86
SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:43550DBA2277BE44F5F842196E084145
SHA256:D19055342C06316F8B80D0B029BD233A3E48AD4C591953AF7B712ADA7F68F403
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datbinary
MD5:9C016064A1F864C8140915D77CF3389A
SHA256:0E7265D4A8C16223538EDD8CD620B8820611C74538E420A88E333BE7F62AC787
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Versiontext
MD5:9F941EA08DBDCA2EB3CFA1DBBBA6F5DC
SHA256:127F71DF0D2AD895D4F293E62284D85971AE047CA15F90B87BF6335898B0B655
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF2106f4.TMP
MD5:
SHA256:
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\336bec91-2a6e-40c8-8942-0d84313f6181.tmpbinary
MD5:5058F1AF8388633F609CADB75A75DC9D
SHA256:
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF2100bb.TMPtext
MD5:E91E138A25FD7E5BCA5E60111F39C91A
SHA256:B1F7E3537A31A4B847F862858E5D2581993CC9372F19ABF19EA2A9185FE42A4F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
150
DNS requests
144
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3740
Yandex.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
binary
471 b
unknown
3740
Yandex.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAc2N7ckVHzYR6z9KGYqXls%3D
unknown
binary
727 b
unknown
3740
Yandex.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTjzY2p9Pa8oibmj%2BNSMWsz63kmWgQUuhbZbU2FL3MpdpovdYxqII%2BeyG8CEAVEr%2FOUnQg5pr%2FbP1%2FlYRY%3D
unknown
binary
727 b
unknown
3048
chrome.exe
GET
200
104.18.20.226:80
http://secure.globalsign.com/cacert/codesigningrootr45.crt
unknown
binary
1.37 Kb
unknown
3048
chrome.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?0edf79035d9585ce
unknown
compressed
65.2 Kb
unknown
3740
Yandex.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?bb51744c9db2bb7c
unknown
compressed
4.66 Kb
unknown
3740
Yandex.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?f9a2e269b33d8fdf
unknown
compressed
4.66 Kb
unknown
3740
Yandex.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?b0f405062fff667e
unknown
compressed
4.66 Kb
unknown
3740
Yandex.exe
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/rootr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDQHuXxad%2F5c1K2Rl1mo%3D
unknown
binary
1.41 Kb
unknown
3740
Yandex.exe
GET
200
104.18.21.226:80
http://ocsp2.globalsign.com/rootr3/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCDQHuXyId%2FGI71DM6hVc%3D
unknown
binary
1.40 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
3048
chrome.exe
239.255.255.250:1900
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2108
chrome.exe
173.194.76.84:443
accounts.google.com
GOOGLE
US
whitelisted
2108
chrome.exe
93.158.134.121:443
browser.yandex.com
YANDEX LLC
RU
whitelisted
2108
chrome.exe
178.154.131.217:443
yastatic.net
YANDEX LLC
RU
whitelisted
2108
chrome.exe
87.250.247.183:443
avatars.mds.yandex.net
YANDEX LLC
RU
whitelisted
2108
chrome.exe
93.158.134.119:443
mc.yandex.ru
YANDEX LLC
RU
whitelisted

DNS requests

Domain
IP
Reputation
accounts.google.com
  • 173.194.76.84
shared
browser.yandex.com
  • 93.158.134.121
whitelisted
yastatic.net
  • 178.154.131.217
  • 178.154.131.215
  • 178.154.131.216
whitelisted
avatars.mds.yandex.net
  • 87.250.247.183
  • 87.250.247.184
  • 87.250.247.181
  • 87.250.247.182
whitelisted
mc.yandex.ru
  • 93.158.134.119
  • 87.250.250.119
  • 77.88.21.119
  • 87.250.251.119
whitelisted
download-paranja.yandex.net
  • 93.158.134.121
whitelisted
mc.yandex.com
  • 77.88.21.119
  • 93.158.134.119
  • 87.250.251.119
  • 87.250.250.119
whitelisted
yandex.ru
  • 5.255.255.77
  • 77.88.55.60
  • 77.88.55.88
  • 5.255.255.70
whitelisted
www.google.com
  • 172.217.16.132
  • 142.250.184.228
whitelisted
download.cdn.yandex.net
  • 5.45.205.245
  • 5.45.205.241
  • 5.45.205.242
  • 5.45.205.243
  • 5.45.205.244
whitelisted

Threats

No threats detected
Process
Message
clidmgr.exe
GetSidFromEnumSess(): i = 0 : szUserName = Administrator, szDomain = USER-PC, dwSessionId = 0
clidmgr.exe
GetSidFromEnumSess(): ProfileImagePath(1) = C:\Users\admin
clidmgr.exe
GetLoggedCreds_WTSSessionInfo(): szUserName = admin, szDomain = USER-PC, dwSessionId = 1
clidmgr.exe
GetSidFromEnumSess(): LsaEnumerateLogonSessions() lpszSid = S-1-5-21-1302019708-1500728564-335382590-1000
clidmgr.exe
GetLoggedCreds_WTSSessionInfo(): szUserName = admin, szDomain = USER-PC, dwSessionId = 1
clidmgr.exe
GetSidFromEnumSess(): LsaEnumerateLogonSessions() lpszSid = S-1-5-21-1302019708-1500728564-335382590-1000
clidmgr.exe
GetSidFromEnumSess(): i = 0 : szUserName = Administrator, szDomain = USER-PC, dwSessionId = 0
clidmgr.exe
GetSidFromEnumSess(): ProfileImagePath(1) = C:\Users\admin